Question: 8 . Create an organization - wide policy defining and authorizing a security or computer incident response team to have full access to and authority
Create an organizationwide policy defining and authorizing a security or computer incident response team to have full access to and authority over all IT systems, applications, data, and physical IT assets when a security or other incident occurs. Create this for the Sunshine Credit Union, which has the following characteristics:
The organization is a regional XYZ Credit Union that has multiple branches and locations throughout the region;
Online banking and use of the Internet are the banks strengths, given its limited human resources;
The customer service department is the organizations most critical business function;
The organization wants to be in compliance with the GrammLeachBliley Act GLBA and IT security best practices regarding its employees;
The organization wants to monitor and control use of the Internet by implementing content filtering;
The organization wants to eliminate personal use of organizationowned IT assets and systems;
The organization wants to monitor and control use of the email system by implementing email security controls;
The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into its annual security awareness training;
The organization wants to create a security or computer incident response team to deal with security breaches and other incidents if attacked providing full authority for the team to perform whatever activities are needed to maintain chain of custody in performing forensics and evidence collection;
The organization wants to implement this policy throughout the organization to provide full authority during crisis to the CIRT team members over all physical facilities, IT assets, IT systems, applications, and data owned by the organization.
Using the following template, in your text document, create a computer incident response policy granting team members full access and authority to perform forensics and to maintain a chain of custody for physical evidence containment.
Step by Step Solution
There are 3 Steps involved in it
1 Expert Approved Answer
Step: 1 Unlock
Question Has Been Solved by an Expert!
Get step-by-step solutions from verified subject matter experts
Step: 2 Unlock
Step: 3 Unlock
